ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Trusted Operating System Approach for Security of an OS with JAVA

Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.1, No. 9)

Publication Date:

Authors : ; ;

Page : 361-368

Keywords : Keywords: Java; Java Security; JVM; z/OS; Security Levels; Trusted OS;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In a little more than a decade since the inception of the Java language, the Java ecosystem has evolved into one that businesses around the world look to for secure, ro enterprise. Java was created to be exploited in highly distributed environments. The portability of the language meant that security had to be incorporated in the very first steps of Java applicati application users could be assured that the code they obtained was secure and had not been tampered with during transmission. This paper explains how to achieve that security. This paper explores the integrated Java platform security that results from the synergy of these two world JVM operates above the operating system security services, meaning that Java Security is actually implemented in the JVM run-time environment. The privileges to be given at the host operating system level to the Java applications execution streams are well established and fully controlled. The paper describes the Java security model as implemented in the z/OS JVM™. In this paper we are also discussin paper will give the brief description of RACF & its groups with respect to z/OS. In this paper we are trying to integrate the JAVA security with the security of an OS. This paper will explain about the OS Secu its terminology, RACF, JNI & Security, & Trusted Operating System. General Terms: Security, Trusted OS, JAVA, JNI, Level.

Last modified: 2014-11-14 23:00:26